Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Cyber Threat Intelligence
    The Pyramid of Pain and Cyber Threat Intelligence
    In order to help teams objectively assess the effectiveness of their threat intelligence program and identify ...
    Read post
    Cyber Threat Intelligence
    How Security Automation Bridges the Intelligence-Action Gap
    Threat intelligence can generate invaluable strategic and tactical insights. One key to bridging the ...
    Read post
    Cyber Threat Intelligence
    Top 5 Cyber Threats to the Healthcare and Public Health Sector in 2022
    It’s crucial for organizations in the healthcare and public health sector to gain an awareness of their risk ...
    Read post
    Cyber Threat Intelligence
    Detection, Isolation, and Negotiation: Improving Your Ransomware Preparedness and Response
    The risks presented by ransomware and cyber extortion events have likely found a place in your own security ...
    Read post
    Current Events
    Killnet, Kaliningrad, and Lithuania’s Transport Standoff With Russia
    Russian cyber collective Killnet has taken responsibility for today’s DDoS attacks on the Lithuanian government ...
    Read post
    Corporate & Physical Security
    Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 
    Attacks on ATMs and other physical payment-related devices, like point-of-sale (POS) terminals, have long been ...
    Read post
    Vulnerability Management
    Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA
    Yesterday, CISA and US Coast Guard Cyber Command (CGCYBER) warned that nation-state hackers are still exploiting ...
    Read post
    Vulnerability Management
    Patch Tuesday Isn’t Ending. Here’s What Microsoft is Saying
    According to Microsoft, Patch Tuesday will continue in July 2022 and the foreseeable future. Unfortunately, ...
    Read post
    Current Events
    Biden Signs State and Local Government Cybersecurity Act Into Law; Establishes Rotational Cyber Workforce
    President Biden signed two cyber-related bills into law on June 21, both of which aim to bolster the ...
    Read post
    Cyber Threat Intelligence
    Why Every Business Should Have Threat Intelligence Program
    Threat intelligence is an essential component to any organization’s risk-remediation and security program. ...
    Read post
    Product Features
    Protect Your Customer Base From Fraud and Account Takeover (ATO) With CCM-C
    It’s imperative for organizations to have a plan for proactively preventing customer fraud and account takeover ...
    Read post
    Vulnerability Management
    China is Exploiting Network Providers and Devices, Says US Cybersecurity Advisory
    On June 7, the US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), ...
    Read post
    There are no results that match your criteria.